Protocols & procedures
Isolation of suspected cases
Establish isolation protocols and deliver solutions to separate suspected cases from the other patients, i.e. placement in different waiting rooms, use of different toilets, restricted areas for water and food supplies.
Remote support of access control
Develop procedures for real-time and remote support of access control including monitoring, reporting, and data analytics.
Repair, maintenance and replacement
Develop procedures and service level agreements to ensure that access control to restricted areas is in perfect working order and can be quickly replaced or repaired if needed.
Establish a protocol for emergency lock-down of rooms, departments, and buildings.
Monitoring, tracking and logging patient and visitors movements
Establish protocol for visiting of patients and develop systems for training, managing and monitoring visitors, i.e. visitor including limits to patient movement around the facility, tracking and logging.
Establish privacy protocols and solutions for (temporary) recording and use of access control data.
Access control for third party parties
Develop a protocol and authorization profiles for service providers i.e. for the outsourcing of waste management and cleaning.
Remote and on-site support of access control
Establish procedures for remote and on-site support of access control including real-time authorizations, (alarm) monitoring, reporting, and data analytics.
Prepare authentication profiles per role/job that can be applied to access control in real-time.
View checklist chapters
Keep me updated
You will receive occasional checklist updates. No marketing or newsletters.
Follow our blog
Stay up to date with our insights and news.